메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 42-49

Self-measurement of the information security level in a monitoring system based on mobile ad hoc networks

Author keywords

Mobile ad hoc networks; Monitoring; Security metrics

Indexed keywords

DEMOCRATIC VOTING; HOSTILE ATTACKS; MOBILE AD HOC NETWORKS; SECURITY METRICS;

EID: 33745486194     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MSHS.2005.1502553     Document Type: Conference Paper
Times cited : (10)

References (29)
  • 1
    • 0032626827 scopus 로고    scopus 로고
    • Satisfaction and usage: Factors contributing to each in the acceptance of information technology
    • Al-Ghatani, S. S., and King, M. Attitudes, Satisfaction and Usage: Factors Contributing to Each in the Acceptance of Information Technology, In Behaviour and Information Technology, 19, 277-297.
    • Behaviour and Information Technology , vol.19 , pp. 277-297
    • Al-Ghatani, S.S.1    Attitudes, K.M.2
  • 3
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public-key management for mobile ad hoc networks
    • Čapkun, S., Buttýn, L. and Hubaux, J-P. Self-Organized Public-Key Management for Mobile Ad Hoc Networks, In IEEE Transactions on Mobile Computing, Vol. 2, No, 1, 2003, 52-64.
    • (2003) IEEE Transactions on Mobile Computing , vol.2 , Issue.1 , pp. 52-64
    • Čapkun, S.1    Buttýn, L.2    Hubaux, J.-P.3
  • 12
    • 33745493480 scopus 로고    scopus 로고
    • SSE-CMM security metrics
    • Washington, D.C.
    • Jelen, G. SSE-CMM Security Metrics, In NIST and CSSPAB Workshop, Washington, D.C., 2000.
    • (2000) NIST and CSSPAB Workshop
    • Jelen, G.1
  • 17
    • 15844362443 scopus 로고    scopus 로고
    • Ad hoc networks security
    • Basagni, S., Conti, M., Giordano, S., and Stojmenovic (Eds.), IEEE Press Wiley, New York
    • Michiardi, P., and Molva, R. Ad Hoc Networks Security, In Basagni, S., Conti, M., Giordano, S., and Stojmenovic (Eds.), Ad Hoc Networking, IEEE Press Wiley, New York, 2003.
    • (2003) Ad Hoc Networking
    • Michiardi, P.1    Molva, R.2
  • 21
    • 0036452448 scopus 로고    scopus 로고
    • Context aware detection of selfish nodes in DSR based ad hoc networks
    • Paul, K. and Westhoff, D. Context Aware Detection of Selfish Nodes in DSR Based Ad Hoc Networks, In Proceedings of IEEE Vehicular Technology Conference, Vol. 56, No. 4., 2002, p. 2424-2429
    • (2002) Proceedings of IEEE Vehicular Technology Conference , vol.56 , Issue.4 , pp. 2424-2429
    • Paul, K.1    Westhoff, D.2
  • 24
    • 0035149763 scopus 로고    scopus 로고
    • Usability and security - An appraisal of usability issues in information security methods
    • Oct.
    • Schultz, E. E., Proctor, R. W., Lien, M.-C., and Salvendy, G. Usability and Security - An Appraisal of Usability Issues in Information Security Methods, In Computer Security, Vol, 20, No. 7, Oct. 2001, 620-634.
    • (2001) Computer Security , vol.20 , Issue.7 , pp. 620-634
    • Schultz, E.E.1    Proctor, R.W.2    Lien, M.-C.3    Salvendy, G.4
  • 25
    • 0003969633 scopus 로고
    • "Orange Book", U.S. Department of Defense Standard, DoD 5200.28-std
    • Trusted Computer System Evaluation Criteria (TCSEC) "Orange Book", 1985, U.S. Department of Defense Standard, DoD 5200.28-std.
    • (1985) Trusted Computer System Evaluation Criteria (TCSEC)
  • 27
    • 1842815887 scopus 로고    scopus 로고
    • Security in mobile ad hoc networks: Challenges and solutions
    • Feb
    • Yang, H., Luo, H., Ye, F., Lu, S., and Zhang, L. Security in Mobile Ad Hoc Networks: Challenges and Solutions, In IEEE Wireless Communications, Vol, 11, No, 1., Feb, 2004, 38-47.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 38-47
    • Yang, H.1    Luo, H.2    Ye, F.3    Lu, S.4    Zhang, L.5
  • 29
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Nov/Dec
    • Zhou, L., and Haas, Z. J. Securing Ad Hoc Networks, In. IEEE Network Magazine, Vol. 13, No. 6, Nov/Dec 1999, 24-30.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.